Static task
static1
Behavioral task
behavioral1
Sample
bd136a4b16959f5ee58819a664a0153fc584fa41bb77635eab54c7cf11d5c8a5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bd136a4b16959f5ee58819a664a0153fc584fa41bb77635eab54c7cf11d5c8a5.exe
Resource
win10v2004-20241007-en
General
-
Target
bd136a4b16959f5ee58819a664a0153fc584fa41bb77635eab54c7cf11d5c8a5
-
Size
343KB
-
MD5
7a2e0c3697e440b986351a45cb37840a
-
SHA1
bfc1d3c3c9eb522323975a3ce2c27fb3c843c097
-
SHA256
bd136a4b16959f5ee58819a664a0153fc584fa41bb77635eab54c7cf11d5c8a5
-
SHA512
e729318411c0cdaf98f72d7b91bf167e8de50285b319aaa5d8ae46ea18f6ecbc0310c830de4f2b14ec93a160bcb394ae6bff9c47c50e3d447b9dbffe1d68afcb
-
SSDEEP
6144:MdhoqnmmqFS3+hC8EaE4SJU1yv/WzoPyylyRfOwM:WxnmmqF0tJGaWUPdlyY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource bd136a4b16959f5ee58819a664a0153fc584fa41bb77635eab54c7cf11d5c8a5
Files
-
bd136a4b16959f5ee58819a664a0153fc584fa41bb77635eab54c7cf11d5c8a5.exe windows:5 windows x86 arch:x86
ae274c29ca15928cb1e23f2e712ba155
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PulseEvent
ReadConsoleInputW
GetFirmwareEnvironmentVariableW
GetCPInfoExW
CreateEventW
CopyFileExA
GetProcAddress
GlobalAlloc
SetDefaultCommConfigA
OpenWaitableTimerW
GetFileAttributesW
EnumResourceTypesW
WriteFileGather
GetModuleHandleW
InterlockedCompareExchange
UnhandledExceptionFilter
LocalFlags
GlobalLock
GetConsoleAliasW
WritePrivateProfileSectionA
FindFirstVolumeMountPointA
SetLastError
SleepEx
AddAtomA
lstrcmpA
SetCalendarInfoA
GetSystemWindowsDirectoryA
EnumTimeFormatsW
GetSystemDirectoryW
AddAtomW
GetExitCodeThread
_llseek
FindNextFileW
CopyFileA
GetShortPathNameW
EnumCalendarInfoA
EnumCalendarInfoExA
AddRefActCtx
SetStdHandle
WriteConsoleW
GetCurrentThreadId
LoadLibraryA
CloseHandle
SetFilePointer
ReadFile
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapFree
RtlUnwind
RaiseException
HeapReAlloc
HeapAlloc
MoveFileA
DeleteFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadLibraryW
GetConsoleCP
GetConsoleMode
CreateFileW
user32
LoadMenuW
advapi32
LookupAccountSidW
shell32
FindExecutableA
ole32
CoGetInstanceFromFile
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 187KB - Virtual size: 689KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ